Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario
暂无分享,去创建一个
[1] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[2] Adi Shamir,et al. Remote Password Extraction from RFID Tags , 2007, IEEE Transactions on Computers.
[3] Johannes Wolkerstorfer,et al. A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines , 2011, WISTP.
[4] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[5] Patel,et al. Information Security: Theory and Practice , 2008 .
[6] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[7] Jean-Jacques Quisquater,et al. A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions. The SEMA and DEMA methods , 2000 .
[8] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[9] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[10] Stefan Mangard,et al. Power and EM Attacks on Passive 13.56 MHz RFID Devices , 2007, CHES.
[11] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[12] Kenneth G. Paterson. Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings , 2011, EUROCRYPT.
[13] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[14] Jean-Jacques Quisquater,et al. Practical Algebraic Attacks on the Hitag2 Stream Cipher , 2009, ISC.
[15] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[16] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[17] Johannes Wolkerstorfer,et al. Attacking ECDSA-Enabled RFID Devices , 2009, ACNS.
[18] Christof Paar,et al. Pushing the Limits: A Very Compact and a Threshold Implementation of AES , 2011, EUROCRYPT.
[19] Norbert Felber,et al. ECC Is Ready for RFID - A Proof in Silicon , 2008, Selected Areas in Cryptography.
[20] Martin Feldhofer,et al. Hardware Implementation of a Flexible Tag Platform for Passive RFID Devices , 2011, 2011 14th Euromicro Conference on Digital System Design.
[21] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[22] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[23] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[24] Axel Poschmann,et al. Lightweight cryptography: cryptographic engineering for a pervasive world , 2009, IACR Cryptol. ePrint Arch..
[25] Christof Paar,et al. EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment , 2009, WISA.
[26] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[27] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[28] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[29] Roger Frost,et al. International Organization for Standardization (ISO) , 2004 .
[30] David Pointcheval. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings , 2006, CT-RSA.
[31] Christof Paar,et al. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World , 2011, CHES.
[32] Panu Hämäläinen,et al. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).
[33] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[34] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[35] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[36] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.